mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-08-04 08:44:25 +00:00
139 lines
5.2 KiB
JSON
139 lines
5.2 KiB
JSON
{
|
|
"data_version": "4.0",
|
|
"data_type": "CVE",
|
|
"data_format": "MITRE",
|
|
"CVE_data_meta": {
|
|
"ID": "CVE-2024-23296",
|
|
"ASSIGNER": "product-security@apple.com",
|
|
"STATE": "PUBLIC"
|
|
},
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "A memory corruption issue was addressed with improved validation. This issue is fixed in iOS 17.4 and iPadOS 17.4. An attacker with arbitrary kernel read and write capability may be able to bypass kernel memory protections. Apple is aware of a report that this issue may have been exploited."
|
|
}
|
|
]
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "An attacker with arbitrary kernel read and write capability may be able to bypass kernel memory protections. Apple is aware of a report that this issue may have been exploited."
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"vendor_name": "Apple",
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "iOS and iPadOS",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_affected": "<",
|
|
"version_name": "unspecified",
|
|
"version_value": "17.4"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"url": "https://support.apple.com/en-us/HT214081",
|
|
"refsource": "MISC",
|
|
"name": "https://support.apple.com/en-us/HT214081"
|
|
},
|
|
{
|
|
"url": "https://support.apple.com/kb/HT214088",
|
|
"refsource": "MISC",
|
|
"name": "https://support.apple.com/kb/HT214088"
|
|
},
|
|
{
|
|
"url": "https://support.apple.com/kb/HT214084",
|
|
"refsource": "MISC",
|
|
"name": "https://support.apple.com/kb/HT214084"
|
|
},
|
|
{
|
|
"url": "https://support.apple.com/kb/HT214086",
|
|
"refsource": "MISC",
|
|
"name": "https://support.apple.com/kb/HT214086"
|
|
},
|
|
{
|
|
"url": "https://support.apple.com/kb/HT214087",
|
|
"refsource": "MISC",
|
|
"name": "https://support.apple.com/kb/HT214087"
|
|
},
|
|
{
|
|
"url": "http://seclists.org/fulldisclosure/2024/Mar/18",
|
|
"refsource": "MISC",
|
|
"name": "http://seclists.org/fulldisclosure/2024/Mar/18"
|
|
},
|
|
{
|
|
"url": "http://seclists.org/fulldisclosure/2024/Mar/21",
|
|
"refsource": "MISC",
|
|
"name": "http://seclists.org/fulldisclosure/2024/Mar/21"
|
|
},
|
|
{
|
|
"url": "http://seclists.org/fulldisclosure/2024/Mar/25",
|
|
"refsource": "MISC",
|
|
"name": "http://seclists.org/fulldisclosure/2024/Mar/25"
|
|
},
|
|
{
|
|
"url": "http://seclists.org/fulldisclosure/2024/Mar/24",
|
|
"refsource": "MISC",
|
|
"name": "http://seclists.org/fulldisclosure/2024/Mar/24"
|
|
},
|
|
{
|
|
"url": "http://seclists.org/fulldisclosure/2024/Mar/26",
|
|
"refsource": "MISC",
|
|
"name": "http://seclists.org/fulldisclosure/2024/Mar/26"
|
|
},
|
|
{
|
|
"url": "https://support.apple.com/kb/HT214107",
|
|
"refsource": "MISC",
|
|
"name": "https://support.apple.com/kb/HT214107"
|
|
},
|
|
{
|
|
"url": "http://seclists.org/fulldisclosure/2024/May/11",
|
|
"refsource": "MISC",
|
|
"name": "http://seclists.org/fulldisclosure/2024/May/11"
|
|
},
|
|
{
|
|
"url": "http://seclists.org/fulldisclosure/2024/May/13",
|
|
"refsource": "MISC",
|
|
"name": "http://seclists.org/fulldisclosure/2024/May/13"
|
|
},
|
|
{
|
|
"url": "https://support.apple.com/kb/HT214100",
|
|
"refsource": "MISC",
|
|
"name": "https://support.apple.com/kb/HT214100"
|
|
},
|
|
{
|
|
"url": "https://support.apple.com/kb/HT214118",
|
|
"refsource": "MISC",
|
|
"name": "https://support.apple.com/kb/HT214118"
|
|
},
|
|
{
|
|
"url": "http://seclists.org/fulldisclosure/2024/Jul/20",
|
|
"refsource": "MISC",
|
|
"name": "http://seclists.org/fulldisclosure/2024/Jul/20"
|
|
}
|
|
]
|
|
}
|
|
} |